0% found this document useful (0 votes)
64 views10 pages

Owasp Top 10

The OWASP Top 10 outlines the most critical web application security risks, including issues like Broken Access Control, Cryptographic Failures, and Injection flaws. Each risk is accompanied by explanations and recommendations for protection against these vulnerabilities. The document serves as a guide for developers to enhance the security of their applications.

Uploaded by

the.noob
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views10 pages

Owasp Top 10

The OWASP Top 10 outlines the most critical web application security risks, including issues like Broken Access Control, Cryptographic Failures, and Injection flaws. Each risk is accompanied by explanations and recommendations for protection against these vulnerabilities. The document serves as a guide for developers to enhance the security of their applications.

Uploaded by

the.noob
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

19/07/2025, 21:29 OWASP Top 10

Hacksplaining Sign Up Log In

OWASP Top 10

Top 10 Web Application Security Risks

Each year OWASP (the Open Web Application Security Project) publishes the
top ten security vulnerabilities. It represents a broad consensus about the most
critical security risks to web applications.

Click through on the lessons below to learn more about how to protect against
each security risk.

1. Broken Access Control

Access control enforces policy such that users cannot act outside their intended
permissions. Failures typically lead to unauthorized information disclosure,
modification, or destruction of all data or performing a business function outside
the user's limits.

Broken Access Control Directory Traversal

https://www.hacksplaining.com/owasp 1/10
19/07/2025, 21:29 OWASP Top 10

All resources on your site need to have Ensure file paths are safely interpreted,
access control implemented, even if they or hackers can access sensitive files on
aren't intended to be discoverable by a your server.
Learn About This Vulnerability →
user. Learn About This Vulnerability →

Cross-Site Request Forgery


If an attacker can forge HTTP requests to
your site, they may be able to trick your
users into triggering unintended actions.

Learn About This Vulnerability →

2. Cryptographic Failures

Many web applications and APIs do not properly protect sensitive data with
strong encryption. Attackers may steal or modify such weakly protected data to
conduct credit card fraud, identity theft, or other crimes. Sensitive data must be
encrypted at rest and in transit, using a modern (and correctly configured)
encryption algorithm.

https://www.hacksplaining.com/owasp 2/10
19/07/2025, 21:29 OWASP Top 10

Unencrypted Communication
Insufficient encryption can make you
vulnerable to monster-in-the-middle
attacks.

Learn About This Vulnerability →

3. Injection

Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when
untrusted data is sent to an interpreter as part of a command or query. The
attacker’s hostile data can trick the interpreter into executing unintended
commands or accessing data without proper authorization.

SQL Injection Command Execution


If you are vulnerable to SQL Injection, If your application calls out to the OS,
attackers can run arbitrary commands you need to be sure command strings are
against your database. securely constructed.

Learn About This Vulnerability → Learn About This Vulnerability →

4. Insecure Design
https://www.hacksplaining.com/owasp 3/10
19/07/2025, 21:29 OWASP Top 10

Pre-coding activities are critical for the design of secure software. The design
phase of your development lifecycle should gather security requirements and
model threats, and development time should be budgeted to allow for these
requirements to be met. As software changes, your team should test
assumptions and conditions for expected and failure flows, ensuring they are still
accurate and desirable. Failure to do so will let slip critical information to
attackers, and fail to anticipate novel attack vectors.

Insecure Design Information Leakage


Security begins before you start writing Revealing system information helps an
code. attacker learn about your tech stack.

Learn About This Vulnerability → Learn About This Vulnerability →

File Upload Vulnerabilities

https://www.hacksplaining.com/owasp 4/10
19/07/2025, 21:29 OWASP Top 10

File uploads are an easy way for an


attacker to inject malicious code into
your application.

Learn About This Vulnerability →

5. Security Misconfiguration

Your software is only as secure as you configure it to be. Using ad hoc


configuration standards can lead to default accounts being left in place, open
cloud storage, misconfigured HTTP headers, and verbose error messages
containing sensitive information. Not only must all operating systems,
frameworks, libraries, and applications be securely configured, but they must be
patched/upgraded in a timely fashion.

Lax Security Settings


Improper security settings are a common
cause of vulnerabilities.

Learn About This Vulnerability →

6. Vulnerable and Outdated Components

Components, such as libraries, frameworks, and other software modules, run


with the same privileges as the application. If a vulnerable component is
https://www.hacksplaining.com/owasp 5/10
19/07/2025, 21:29 OWASP Top 10

exploited, such an attack can facilitate serious data loss or server takeover.
Applications and APIs using components with known vulnerabilities may
undermine application defenses and enable various attacks and impacts.

Toxic Dependencies
Third-party libraries could be introducing
vulnerabilities or malicious code into your
system.

Learn About This Vulnerability →

7. Identification and Authentication Failures

Application functions related to authentication and session management are


often implemented incorrectly, allowing attackers to compromise passwords,
keys, or session tokens, or to exploit other implementation flaws to assume
other users’ identities temporarily or permanently.

https://www.hacksplaining.com/owasp 6/10
19/07/2025, 21:29 OWASP Top 10

Password Mismanagement Privilege Escalation


Safe treatment of passwords is essential Privilege escalation occurs when an
to a secure authentication system - yet attacker exploits a vulnerability to
many websites get this wrong. impersonate another user or gain extra
permissions.
Learn About This Vulnerability → Learn About This Vulnerability →

User Enumeration Session Fixation


Leaking username information on your Insecure treatment of session IDs can
site makes things much easier for leave your users vulnerable to having
hackers. their session hijacked.

Learn About This Vulnerability → Learn About This Vulnerability →

Weak Session IDs

https://www.hacksplaining.com/owasp 7/10
19/07/2025, 21:29 OWASP Top 10

Guessable session IDs make your website


vulnerable to session hijacking.

Learn About This Vulnerability →

8. Software and Data Integrity Failures

Software and data integrity failures relate to code and infrastructure that does
not protect against integrity violations. An example of this is where an
application relies upon plugins, libraries, or modules from untrusted sources,
repositories, and content delivery networks (CDNs). An insecure deployment
pipeline can introduce the potential for unauthorized access, malicious code, or
system compromise. Lastly, many applications now include auto-update
functionality, where updates are downloaded without sufficient integrity
verification and applied to the previously trusted application. Attackers could
potentially upload their own updates to be distributed and run on all
installations.

9. Security Logging and Monitoring Failures

Insufficient logging and monitoring, coupled with missing or ineffective


integration with incident response, allows attackers to further attack systems,
maintain persistence, pivot to more systems, and tamper, extract, or destroy
data. Most breach studies show time to detect a breach is over 200 days,
typically detected by external parties rather than internal processes or
monitoring.

https://www.hacksplaining.com/owasp 8/10
19/07/2025, 21:29 OWASP Top 10

Logging and Monitoring


Comprehensive logging and monitoring
will tell you what your site is doing at
runtime, which is key to spotting security
events
Learn About This Vulnerability →

10. Server-Side Request Forgery

Server-Side Request Forgery (SSRF) flaws occur whenever a web application


fetches a remote resource without validating the user-supplied URL. It allows an
attacker to coerce the application to send a crafted request to an unexpected
destination, even when protected by a firewall, VPN, or another type of network
access control list (ACL).

Server-Side Request Forgery


An attacker can use SSRF vulnerabilities
to probe your internal network

Learn About This Vulnerability →

https://www.hacksplaining.com/owasp 9/10
19/07/2025, 21:29 OWASP Top 10

Lessons Glossary Terms and Conditions Privacy Policy

© 2025 Hacksplaining Inc. All rights reserved. Questions? Email us at support@hacksplaining.com

https://www.hacksplaining.com/owasp 10/10

You might also like